Limiting sybil attacks in structured P2P networks

被引:49
|
作者
Rowaihy, Hosam [1 ]
Enck, William [1 ]
McDaniel, Patrick [1 ]
La Porta, Thomas [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
来源
关键词
D O I
10.1109/INFCOM.2007.328
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One practical limitation of structured peer-to-peer (P2P) networks is that they are frequently subject to Sybil attacks: malicious parties can compromise the network by generating and controlling large numbers of shadow identities. In this paper, we propose an admission control system that mitigates Sybil attacks by adaptively constructing a hierarchy of cooperative peers. The admission control system vets joining nodes via client puzzles. A node wishing to join the network is serially challenged by the nodes from a leaf to the root of the hierarchy. Nodes completing the puzzles of all nodes in the chain are provided a cryptographic proof of the vetted identity. We evaluate our solution and show that an adversary must perform days or weeks of effort to obtain even a small percentage of nodes in small P2P networks, and that this effort increases linearly with the size of the network. We further show that we can place a ceiling on the number of IDs any adversary may obtain by requiring periodic reassertion of the IDs continued validity.
引用
收藏
页码:2596 / +
页数:2
相关论文
共 50 条
  • [1] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
  • [2] Pollution Attacks Identification in Structured P2P Overlay Networks
    Trifa, Zied
    Hajlaoui, Jalel Eddine
    Khemakhem, Maher
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
  • [3] Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model
    Shareh, Morteza Babazadeh
    Navidi, Hamidreza
    Javadi, Hamid Haj Seyyed
    HosseinZadeh, Mehdi
    [J]. INFORMATION SCIENCES, 2019, 470 : 94 - 108
  • [4] Sybil Resilient Identity Distribution in P2P Networks
    Jose, Jissy Liz
    Jayasudha, J. S.
    Thampi, Sabu M.
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 433 - 439
  • [5] A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 128 - 134
  • [6] ID mapping attacks in P2P networks
    Cerri, D
    Ghioni, A
    Paraboschi, S
    Tiraboschi, S
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1785 - 1790
  • [7] SyMon: Defending Large Structured P2P Systems Against Sybil Attack
    Jyothi, B. S.
    Janakiram, Dharanipragada
    [J]. 2009 IEEE NINTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P 2009), 2009, : 21 - 30
  • [8] ID Repetition in Structured P2P Networks
    Yu, Jie
    Li, Zhoujun
    Xiao, Peng
    Fang, Chengfang
    Xu, Jia
    Chang, Ee-Chien
    [J]. COMPUTER JOURNAL, 2011, 54 (06): : 962 - 975
  • [9] Approximate Aggregations in Structured P2P Networks
    Sun, Dalie
    Wu, Sai
    Jiang, Shouxu
    Li, Jianzhong
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (11) : 1748 - 1752
  • [10] Efficient broadcast in structured P2P networks
    El-Ansary, S
    Alima, LO
    Brand, P
    Haridi, S
    [J]. PEER-TO-PEER SYSTEMS II, 2003, 2735 : 304 - 314